Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-3801 (GCVE-0-2006-3801)
Vulnerability from cvelistv5 – Published: 2006-07-27 20:00 – Updated: 2024-08-07 18:39- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:39:54.111Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "21243",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21243"
},
{
"name": "RHSA-2006:0608",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"name": "GLSA-200608-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"name": "MDKSA-2006:145",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"name": "ADV-2006-3748",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name": "oval:org.mitre.oval:def:11501",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
},
{
"name": "19181",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19181"
},
{
"name": "TA06-208A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"name": "ADV-2006-2998",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"name": "20060727 rPSA-2006-0137-1 firefox",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
},
{
"name": "21529",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21529"
},
{
"name": "21216",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21216"
},
{
"name": "GLSA-200608-03",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"name": "RHSA-2006:0594",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name": "21336",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21336"
},
{
"name": "ADV-2006-3749",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "RHSA-2006:0610",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"name": "1016588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016588"
},
{
"name": "RHSA-2006:0609",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name": "22210",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22210"
},
{
"name": "1016586",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016586"
},
{
"name": "19873",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/19873"
},
{
"name": "21262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21262"
},
{
"name": "21532",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21532"
},
{
"name": "21270",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21270"
},
{
"name": "ADV-2008-0083",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "USN-327-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/327-1/"
},
{
"name": "21361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21361"
},
{
"name": "21631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21631"
},
{
"name": "SSRT061181",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "SSRT061236",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "21246",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21246"
},
{
"name": "mozilla-deleted-frame-code-execution(27980)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"name": "SUSE-SA:2006:048",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"name": "21229",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21229"
},
{
"name": "1016587",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016587"
},
{
"name": "HPSBUX02153",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "RHSA-2006:0611",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name": "21228",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21228"
},
{
"name": "21250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21250"
},
{
"name": "HPSBUX02156",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "VU#476724",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"name": "21358",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21358"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"name": "22066",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22066"
},
{
"name": "21269",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21269"
},
{
"name": "21343",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21343"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"name": "MDKSA-2006:143",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"name": "22065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22065"
},
{
"name": "USN-354-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"name": "20060703-01-P",
"tags": [
"vendor-advisory",
"x_refsource_SGI",
"x_transferred"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "21243",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21243"
},
{
"name": "RHSA-2006:0608",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"name": "GLSA-200608-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"name": "MDKSA-2006:145",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"name": "ADV-2006-3748",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name": "oval:org.mitre.oval:def:11501",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
},
{
"name": "19181",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19181"
},
{
"name": "TA06-208A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"name": "ADV-2006-2998",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"name": "20060727 rPSA-2006-0137-1 firefox",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
},
{
"name": "21529",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21529"
},
{
"name": "21216",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21216"
},
{
"name": "GLSA-200608-03",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"name": "RHSA-2006:0594",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name": "21336",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21336"
},
{
"name": "ADV-2006-3749",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "RHSA-2006:0610",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"name": "1016588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016588"
},
{
"name": "RHSA-2006:0609",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name": "22210",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22210"
},
{
"name": "1016586",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016586"
},
{
"name": "19873",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/19873"
},
{
"name": "21262",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21262"
},
{
"name": "21532",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21532"
},
{
"name": "21270",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21270"
},
{
"name": "ADV-2008-0083",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "USN-327-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/327-1/"
},
{
"name": "21361",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21361"
},
{
"name": "21631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21631"
},
{
"name": "SSRT061181",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "SSRT061236",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "21246",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21246"
},
{
"name": "mozilla-deleted-frame-code-execution(27980)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"name": "SUSE-SA:2006:048",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"name": "21229",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21229"
},
{
"name": "1016587",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016587"
},
{
"name": "HPSBUX02153",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "RHSA-2006:0611",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name": "21228",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21228"
},
{
"name": "21250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21250"
},
{
"name": "HPSBUX02156",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "VU#476724",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"name": "21358",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21358"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"name": "22066",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22066"
},
{
"name": "21269",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21269"
},
{
"name": "21343",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21343"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"name": "MDKSA-2006:143",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"name": "22065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22065"
},
{
"name": "USN-354-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"name": "20060703-01-P",
"tags": [
"vendor-advisory",
"x_refsource_SGI"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2006-3801",
"datePublished": "2006-07-27T20:00:00.000Z",
"dateReserved": "2006-07-24T00:00:00.000Z",
"dateUpdated": "2024-08-07T18:39:54.111Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABB88E86-6E83-4A59-9266-8B98AA91774D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F38886-C25A-4C6B-93E7-36461405BA99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09E18FC0-0C8C-4FA1-85B9-B868D00F002F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*\", \"matchCriteriaId\": \"55344F76-1C42-4DD8-A28B-1C33626C6FD2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6521C877-63C9-4B6E-9FC9-1263FFBB7950\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D949DF0A-CBC2-40E1-AE6C-60E6F58D2481\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.\"}, {\"lang\": \"es\", \"value\": \"Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 no limpia de forma adecuada una referencia JavaScript a un frame o window, lo caul deja un punterio a un objeto borrado que permite a atacantes remotos ejecutar c\\u00f3digo nativo de su elecci\\u00f3n.\"}]",
"id": "CVE-2006-3801",
"lastModified": "2024-11-21T00:14:27.440",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": true, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2006-07-27T20:04:00.000",
"references": "[{\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2006-0609.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/19873\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21216\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21228\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21229\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21243\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21246\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21250\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21262\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21269\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21270\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21336\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21343\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21358\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21361\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21529\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21532\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/21631\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/22065\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/22066\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/22210\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200608-02.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1016586\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1016587\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://securitytracker.com/id?1016588\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/476724\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2006:143\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2006:145\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0594.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0608.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0610.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0611.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/441333/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446657/100/200/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446657/100/200/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446658/100/200/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446658/100/200/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/19181\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-354-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/2998\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3748\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3749\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0083\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27980\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-536\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-537\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://usn.ubuntu.com/327-1/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2006-0609.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/19873\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21216\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21228\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21229\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/21243\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21246\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21250\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21262\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21269\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21270\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21336\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21343\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21358\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21361\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21529\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21532\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/21631\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22065\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22066\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22210\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200608-02.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016586\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016587\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016588\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/476724\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2006:143\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2006:145\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0594.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0608.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0610.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0611.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/441333/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446657/100/200/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446657/100/200/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446658/100/200/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/446658/100/200/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/19181\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.ubuntu.com/usn/usn-354-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2006/2998\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3748\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/3749\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0083\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27980\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-536\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.rpath.com/browse/RPL-537\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/327-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2006-3801\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2006-07-27T20:04:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.\"},{\"lang\":\"es\",\"value\":\"Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 no limpia de forma adecuada una referencia JavaScript a un frame o window, lo caul deja un punterio a un objeto borrado que permite a atacantes remotos ejecutar c\u00f3digo nativo de su elecci\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB88E86-6E83-4A59-9266-8B98AA91774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6BF5B1-86D1-47FE-9D9C-735718F94874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F38886-C25A-4C6B-93E7-36461405BA99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E18FC0-0C8C-4FA1-85B9-B868D00F002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*\",\"matchCriteriaId\":\"55344F76-1C42-4DD8-A28B-1C33626C6FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6521C877-63C9-4B6E-9FC9-1263FFBB7950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D949DF0A-CBC2-40E1-AE6C-60E6F58D2481\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0609.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/19873\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21216\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21228\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21229\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21243\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21246\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21250\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21262\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21269\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21270\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21336\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21343\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21358\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21361\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21529\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21532\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/21631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22065\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22210\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200608-02.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016586\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016587\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1016588\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/476724\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:143\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:145\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0594.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0608.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0610.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0611.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/441333/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/446657/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/446657/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/19181\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-354-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/2998\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3749\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0083\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27980\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-536\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://issues.rpath.com/browse/RPL-537\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://usn.ubuntu.com/327-1/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2006-0609.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/21243\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21250\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21270\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200608-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016587\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016588\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/476724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2006:145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2006/mfsa2006-44.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0594.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0608.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0610.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0611.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/441333/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/446657/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/446657/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/446658/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19181\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-354-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-208A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/2998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3748\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/3749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-536\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-537\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/327-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2006:0611
Vulnerability from csaf_redhat - Published: 2006-07-29 00:16 - Updated: 2026-01-13 22:20Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\n1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues:\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could execute arbitrary\njavascript instructions with the permissions of \"chrome\", allowing the page\nto steal sensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed\ncertain mail messages. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Thunderbird.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned by\nother domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled javascript\ninput object mutation. A malicious mail message could upload an arbitrary\nlocal file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() javascript function. A malicious mail message could crash\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\nA malicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install client malware. (CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript disabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as the\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious web site could\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.5 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0611",
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "197078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=197078"
},
{
"category": "external",
"summary": "200171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200171"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0611.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2026-01-13T22:20:50+00:00",
"generator": {
"date": "2026-01-13T22:20:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2006:0611",
"initial_release_date": "2006-07-29T00:16:00+00:00",
"revision_history": [
{
"date": "2006-07-29T00:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-07-28T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:20:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.src",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2781",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "193963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(seamonkey): DOS/arbitrary code execution vuln with vcards",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2781"
},
{
"category": "external",
"summary": "RHBZ#193963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "(seamonkey): DOS/arbitrary code execution vuln with vcards"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
RHSA-2006_0611
Vulnerability from csaf_redhat - Published: 2006-07-29 00:16 - Updated: 2024-11-22 00:27Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Thunderbird\n1.0 branch. This update deprecates the Mozilla Thunderbird 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Thunderbird\n1.5 branch.\n\nThis update also resolves a number of outstanding Thunderbird security issues:\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could execute arbitrary\njavascript instructions with the permissions of \"chrome\", allowing the page\nto steal sensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809)\n\nSeveral denial of service flaws were found in the way Thunderbird processed\ncertain mail messages. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Thunderbird.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677,\nCVE-2006-3113, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nSeveral flaws were found in the way Thunderbird processed certain\njavascript actions. A malicious mail message could conduct a cross-site\nscripting attack or steal sensitive information (such as cookies owned by\nother domains). (CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Thunderbird handled javascript\ninput object mutation. A malicious mail message could upload an arbitrary\nlocal file at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Thunderbird called the\ncrypto.signText() javascript function. A malicious mail message could crash\nthe browser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nA flaw was found in the way Thunderbird processed Proxy AutoConfig scripts.\nA malicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install client malware. (CVE-2006-3808)\n\nNote: Please note that JavaScript support is disabled by default in\nThunderbird. The above issues are not exploitable with JavaScript disabled. \n\nTwo flaws were found in the way Thunderbird displayed malformed inline\nvcard attachments. If a victim viewed an email message containing a\ncarefully crafted vcard it was possible to execute arbitrary code as the\nuser running Thunderbird. (CVE-2006-2781, CVE-2006-3804)\n\nA cross site scripting flaw was found in the way Thunderbird processed\nUnicode Byte-order-Mark (BOM) markers in UTF-8 mail messages. A malicious\nweb page could execute a script within the browser that a web input\nsanitizer could miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nTwo HTTP response smuggling flaws were found in the way Thunderbird\nprocessed certain invalid HTTP response headers. A malicious web site could\nreturn specially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto crash Thunderbird. (CVE-2006-2788)\n\nUsers of Thunderbird are advised to upgrade to this update, which contains\nThunderbird version 1.5.0.5 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0611",
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "197078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=197078"
},
{
"category": "external",
"summary": "200171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200171"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0611.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2024-11-22T00:27:24+00:00",
"generator": {
"date": "2024-11-22T00:27:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0611",
"initial_release_date": "2006-07-29T00:16:00+00:00",
"revision_history": [
{
"date": "2006-07-29T00:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-07-28T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:27:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.src",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"product_id": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.5-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_id": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.5-0.el4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2781",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "193963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(seamonkey): DOS/arbitrary code execution vuln with vcards",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2781"
},
{
"category": "external",
"summary": "RHBZ#193963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "(seamonkey): DOS/arbitrary code execution vuln with vcards"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-29T00:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4AS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.src",
"4Desktop:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.src",
"4ES:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.src",
"4WS:thunderbird-0:1.5.0.5-0.el4.1.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0611"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
}
]
}
RHSA-2006:0594
Vulnerability from csaf_redhat - Published: 2006-08-28 11:30 - Updated: 2026-01-13 22:34Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\nfavor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page it was possible to\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0594",
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "198686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=198686"
},
{
"category": "external",
"summary": "198687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=198687"
},
{
"category": "external",
"summary": "200167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200167"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0594.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update (was mozilla)",
"tracking": {
"current_release_date": "2026-01-13T22:34:32+00:00",
"generator": {
"date": "2026-01-13T22:34:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2006:0594",
"initial_release_date": "2006-08-28T11:30:00+00:00",
"revision_history": [
{
"date": "2006-08-28T11:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-09-15T09:27:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:34:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "Red Hat Linux Advanced Workstation 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "Red Hat Enterprise Linux ES version 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "Red Hat Enterprise Linux WS version 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2781",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "193963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(seamonkey): DOS/arbitrary code execution vuln with vcards",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2781"
},
{
"category": "external",
"summary": "RHBZ#193963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "(seamonkey): DOS/arbitrary code execution vuln with vcards"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006_0594
Vulnerability from csaf_redhat - Published: 2006-08-28 11:30 - Updated: 2024-11-22 00:27Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackages are now available for Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 2.1 in\nfavor of the supported SeaMonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way SeaMonkey Messenger displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running SeaMonkey Messenger. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way SeaMonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way SeaMonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way SeaMonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way SeaMonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page it was possible to\nexecute arbitrary code as the user running SeaMonkey. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0594",
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "198686",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=198686"
},
{
"category": "external",
"summary": "198687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=198687"
},
{
"category": "external",
"summary": "200167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200167"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0594.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update (was mozilla)",
"tracking": {
"current_release_date": "2024-11-22T00:27:05+00:00",
"generator": {
"date": "2024-11-22T00:27:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0594",
"initial_release_date": "2006-08-28T11:30:00+00:00",
"revision_history": [
{
"date": "2006-08-28T11:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-09-15T09:27:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:27:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "Red Hat Linux Advanced Workstation 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "Red Hat Enterprise Linux ES version 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "Red Hat Enterprise Linux WS version 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2781",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "193963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(seamonkey): DOS/arbitrary code execution vuln with vcards",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2781"
},
{
"category": "external",
"summary": "RHBZ#193963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "(seamonkey): DOS/arbitrary code execution vuln with vcards"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-28T11:30:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"Red Hat Enterprise Linux ES version 2.1",
"Red Hat Enterprise Linux WS version 2.1",
"Red Hat Linux Advanced Workstation 2.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0594"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006_0608
Vulnerability from csaf_redhat - Published: 2006-07-27 19:53 - Updated: 2024-11-22 00:27Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0608",
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "200253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200253"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0608.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2024-11-22T00:27:09+00:00",
"generator": {
"date": "2024-11-22T00:27:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0608",
"initial_release_date": "2006-07-27T19:53:00+00:00",
"revision_history": [
{
"date": "2006-07-27T19:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-07-27T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:27:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.src",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.src",
"product_id": "seamonkey-0:1.0.3-0.el3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006_0609
Vulnerability from csaf_redhat - Published: 2006-08-02 18:39 - Updated: 2024-11-22 00:27Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackage are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Seamonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\nfavor of the supported Seamonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Seamonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Seamonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way Seamonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way Seamonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Seamonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Seamonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeamonkey version 1.0.3 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0609",
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "193906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193906"
},
{
"category": "external",
"summary": "196969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=196969"
},
{
"category": "external",
"summary": "200161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200161"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0609.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2024-11-22T00:27:15+00:00",
"generator": {
"date": "2024-11-22T00:27:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0609",
"initial_release_date": "2006-08-02T18:39:00+00:00",
"revision_history": [
{
"date": "2006-08-02T18:39:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-08-02T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:27:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"product": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"product_id": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.x86_64",
"product": {
"name": "devhelp-0:0.10-0.2.el4.x86_64",
"product_id": "devhelp-0:0.10-0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"product_id": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.2.el4.i386",
"product": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386",
"product_id": "devhelp-devel-0:0.10-0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.i386",
"product": {
"name": "devhelp-0:0.10-0.2.el4.i386",
"product_id": "devhelp-0:0.10-0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"product_id": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.src",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.src",
"product_id": "seamonkey-0:1.0.3-0.el4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.src",
"product": {
"name": "devhelp-0:0.10-0.2.el4.src",
"product_id": "devhelp-0:0.10-0.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.2.el4.ppc",
"product": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc",
"product_id": "devhelp-devel-0:0.10-0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.ppc",
"product": {
"name": "devhelp-0:0.10-0.2.el4.ppc",
"product_id": "devhelp-0:0.10-0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"product_id": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2781",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "193963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(seamonkey): DOS/arbitrary code execution vuln with vcards",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2781"
},
{
"category": "external",
"summary": "RHBZ#193963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "(seamonkey): DOS/arbitrary code execution vuln with vcards"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006:0609
Vulnerability from csaf_redhat - Published: 2006-08-02 18:39 - Updated: 2026-01-13 22:39Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs in the mozilla\npackage are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Seamonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Suite. This\nupdate deprecates the Mozilla Suite in Red Hat Enterprise Linux 4 in\nfavor of the supported Seamonkey Suite.\n\nThis update also resolves a number of outstanding Mozilla security issues:\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Seamonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Seamonkey.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nTwo flaws were found in the way Seamonkey-mail displayed malformed\ninline vcard attachments. If a victim viewed an email message containing\na carefully crafted vcard it was possible to execute arbitrary code as the\nuser running Mozilla-mail. (CVE-2006-2781, CVE-2006-3804)\n\nA cross-site scripting flaw was found in the way Seamonkey processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Seamonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Seamonkey handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Seamonkey called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Seamonkey processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Seamonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Mozilla. (CVE-2006-2788)\n\nUsers of Mozilla are advised to upgrade to this update, which contains\nSeamonkey version 1.0.3 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0609",
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "193906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193906"
},
{
"category": "external",
"summary": "196969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=196969"
},
{
"category": "external",
"summary": "200161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200161"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0609.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2026-01-13T22:39:56+00:00",
"generator": {
"date": "2026-01-13T22:39:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2006:0609",
"initial_release_date": "2006-08-02T18:39:00+00:00",
"revision_history": [
{
"date": "2006-08-02T18:39:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-08-02T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:39:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"product": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"product_id": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.x86_64",
"product": {
"name": "devhelp-0:0.10-0.2.el4.x86_64",
"product_id": "devhelp-0:0.10-0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"product_id": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.2.el4.i386",
"product": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386",
"product_id": "devhelp-devel-0:0.10-0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.i386",
"product": {
"name": "devhelp-0:0.10-0.2.el4.i386",
"product_id": "devhelp-0:0.10-0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"product_id": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.src",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.src",
"product_id": "seamonkey-0:1.0.3-0.el4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.src",
"product": {
"name": "devhelp-0:0.10-0.2.el4.src",
"product_id": "devhelp-0:0.10-0.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.2.el4.ppc",
"product": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc",
"product_id": "devhelp-devel-0:0.10-0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.2.el4.ppc",
"product": {
"name": "devhelp-0:0.10-0.2.el4.ppc",
"product_id": "devhelp-0:0.10-0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"product_id": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.2.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.src"
},
"product_reference": "devhelp-0:0.10-0.2.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.2.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2781",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "193963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(seamonkey): DOS/arbitrary code execution vuln with vcards",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2781"
},
{
"category": "external",
"summary": "RHBZ#193963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2781"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "(seamonkey): DOS/arbitrary code execution vuln with vcards"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-08-02T18:39:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nMultilib systems may experience difficulty if trying to specify the package\nby name to the Update Agent via a command line argument. This can be\nsolved by executing the following commands:\n\nup2date seamonkey; up2date seamonkey-nss seamonkey-nspr",
"product_ids": [
"4AS:devhelp-0:0.10-0.2.el4.i386",
"4AS:devhelp-0:0.10-0.2.el4.ppc",
"4AS:devhelp-0:0.10-0.2.el4.src",
"4AS:devhelp-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.2.el4.i386",
"4AS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4AS:seamonkey-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-0:1.0.3-0.el4.1.src",
"4AS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4AS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4Desktop:devhelp-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-0:0.10-0.2.el4.src",
"4Desktop:devhelp-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.src",
"4Desktop:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4Desktop:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4ES:devhelp-0:0.10-0.2.el4.i386",
"4ES:devhelp-0:0.10-0.2.el4.ppc",
"4ES:devhelp-0:0.10-0.2.el4.src",
"4ES:devhelp-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.2.el4.i386",
"4ES:devhelp-devel-0:0.10-0.2.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4ES:seamonkey-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-0:1.0.3-0.el4.1.src",
"4ES:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4ES:seamonkey-mail-0:1.0.3-0.el4.1.x86_64",
"4WS:devhelp-0:0.10-0.2.el4.i386",
"4WS:devhelp-0:0.10-0.2.el4.ppc",
"4WS:devhelp-0:0.10-0.2.el4.src",
"4WS:devhelp-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.2.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.2.el4.i386",
"4WS:devhelp-devel-0:0.10-0.2.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.2.el4.x86_64",
"4WS:seamonkey-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-0:1.0.3-0.el4.1.src",
"4WS:seamonkey-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-chat-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-debuginfo-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-devel-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-js-debugger-0:1.0.3-0.el4.1.x86_64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.i386",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ia64",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.ppc",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.s390x",
"4WS:seamonkey-mail-0:1.0.3-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0609"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006:0610
Vulnerability from csaf_redhat - Published: 2006-07-28 23:22 - Updated: 2026-01-13 22:08Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\n1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues:\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Firefox.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0610",
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "193895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193895"
},
{
"category": "external",
"summary": "196973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=196973"
},
{
"category": "external",
"summary": "200168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200168"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0610.json"
}
],
"title": "Red Hat Security Advisory: firefox security update",
"tracking": {
"current_release_date": "2026-01-13T22:08:18+00:00",
"generator": {
"date": "2026-01-13T22:08:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2006:0610",
"initial_release_date": "2006-07-28T23:22:00+00:00",
"revision_history": [
{
"date": "2006-07-28T23:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-07-28T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:08:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64",
"product_id": "firefox-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.src",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.src",
"product_id": "firefox-0:1.5.0.5-0.el4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386",
"product_id": "firefox-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc",
"product_id": "firefox-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x",
"product_id": "firefox-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390",
"product_id": "firefox-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006_0610
Vulnerability from csaf_redhat - Published: 2006-07-28 23:22 - Updated: 2024-11-22 00:27Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested <option> tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) "Content-implemented tree views," (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via "jsstr tagify," which leads to memory corruption.
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the "Manual Install" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a "View Image" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting "Show only this frame" on a frame whose SRC attribute contains a Javascript URL.
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Firefox is an open source Web browser.\n\nThe Mozilla Foundation has discontinued support for the Mozilla Firefox\n1.0 branch. This update deprecates the Mozilla Firefox 1.0 branch in\nRed Hat Enterprise Linux 4 in favor of the supported Mozilla Firefox\n1.5 branch.\n\nThis update also resolves a number of outstanding Firefox security issues:\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-2776,\nCVE-2006-2784, CVE-2006-2785, CVE-2006-2787, CVE-2006-3807, CVE-2006-3809,\nCVE-2006-3812)\n\nSeveral denial of service flaws were found in the way Firefox processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running Firefox.\n(CVE-2006-2779, CVE-2006-2780, CVE-2006-3801, CVE-2006-3677, CVE-2006-3113,\nCVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3811)\n\nA cross-site scripting flaw was found in the way Firefox processed\nUnicode Byte-Order-Mark (BOM) markers in UTF-8 web pages. A malicious web\npage could execute a script within the browser that a web input sanitizer\ncould miss due to a malformed \"script\" tag. (CVE-2006-2783)\n\nSeveral flaws were found in the way Firefox processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA form file upload flaw was found in the way Firefox handled javascript\ninput object mutation. A malicious web page could upload an arbitrary local\nfile at form submission time without user interaction. (CVE-2006-2782)\n\nA denial of service flaw was found in the way Firefox called the\ncrypto.signText() javascript function. A malicious web page could crash the\nbrowser if the victim had a client certificate loaded. (CVE-2006-2778)\n\nTwo HTTP response smuggling flaws were found in the way Firefox processed\ncertain invalid HTTP response headers. A malicious web site could return\nspecially crafted HTTP response headers which may bypass HTTP proxy\nrestrictions. (CVE-2006-2786)\n\nA flaw was found in the way Firefox processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nA double free flaw was found in the way the nsIX509::getRawDER method was\ncalled. If a victim visited a carefully crafted web page, it was possible\nto execute arbitrary code as the user running Firefox. (CVE-2006-2788)\n\nUsers of Firefox are advised to upgrade to this update, which contains\nFirefox version 1.5.0.5 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0610",
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "193895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=193895"
},
{
"category": "external",
"summary": "196973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=196973"
},
{
"category": "external",
"summary": "200168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200168"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0610.json"
}
],
"title": "Red Hat Security Advisory: firefox security update",
"tracking": {
"current_release_date": "2024-11-22T00:27:20+00:00",
"generator": {
"date": "2024-11-22T00:27:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2006:0610",
"initial_release_date": "2006-07-28T23:22:00+00:00",
"revision_history": [
{
"date": "2006-07-28T23:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-07-28T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T00:27:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64",
"product_id": "firefox-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.src",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.src",
"product_id": "firefox-0:1.5.0.5-0.el4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386",
"product_id": "firefox-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc",
"product_id": "firefox-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x",
"product_id": "firefox-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "firefox-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390",
"product_id": "firefox-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_id": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.5-0.el4.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.src"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
},
"product_reference": "firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-2776",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618112"
}
],
"notes": [
{
"category": "description",
"text": "Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2776"
},
{
"category": "external",
"summary": "RHBZ#1618112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2776"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2778",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618113"
}
],
"notes": [
{
"category": "description",
"text": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2778"
},
{
"category": "external",
"summary": "RHBZ#1618113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2778"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2779",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618114"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested \u003coption\u003e tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) \"Content-implemented tree views,\" (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2779"
},
{
"category": "external",
"summary": "RHBZ#1618114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2779"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2780",
"discovery_date": "2006-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618115"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via \"jsstr tagify,\" which leads to memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2780"
},
{
"category": "external",
"summary": "RHBZ#1618115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2780"
}
],
"release_date": "2006-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2782",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618116"
}
],
"notes": [
{
"category": "description",
"text": "Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2782"
},
{
"category": "external",
"summary": "RHBZ#1618116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2782"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2783",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618117"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2783"
},
{
"category": "external",
"summary": "RHBZ#1618117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2783"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2784",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618118"
}
],
"notes": [
{
"category": "description",
"text": "The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the \"Manual Install\" button, then using nested javascript: URLs. NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2784"
},
{
"category": "external",
"summary": "RHBZ#1618118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2784"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2785",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618119"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a \"View Image\" on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting \"Show only this frame\" on a frame whose SRC attribute contains a Javascript URL.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2785"
},
{
"category": "external",
"summary": "RHBZ#1618119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2785"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2785"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2786",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618120"
}
],
"notes": [
{
"category": "description",
"text": "HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2786"
},
{
"category": "external",
"summary": "RHBZ#1618120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2786"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2786"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2787",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618121"
}
],
"notes": [
{
"category": "description",
"text": "EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2787"
},
{
"category": "external",
"summary": "RHBZ#1618121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2787"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-2788",
"discovery_date": "2006-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618122"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-2788"
},
{
"category": "external",
"summary": "RHBZ#1618122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2788"
}
],
"release_date": "2006-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-28T23:22:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"4AS:firefox-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-0:1.5.0.5-0.el4.1.src",
"4AS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4AS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.src",
"4Desktop:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4Desktop:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-0:1.5.0.5-0.el4.1.src",
"4ES:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4ES:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-0:1.5.0.5-0.el4.1.src",
"4WS:firefox-0:1.5.0.5-0.el4.1.x86_64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.i386",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ia64",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.ppc",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.s390x",
"4WS:firefox-debuginfo-0:1.5.0.5-0.el4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0610"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
RHSA-2006:0608
Vulnerability from csaf_redhat - Published: 2006-07-27 19:53 - Updated: 2026-01-13 22:34Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3807,\nCVE-2006-3809, CVE-2006-3812)\n\nSeveral denial of service flaws were found in the way SeaMonkey processed\ncertain web content. A malicious web page could crash the browser or\npossibly execute arbitrary code as the user running SeaMonkey.\n(CVE-2006-3801, CVE-2006-3677, CVE-2006-3113, CVE-2006-3803, CVE-2006-3805,\nCVE-2006-3806, CVE-2006-3811)\n\nA buffer overflow flaw was found in the way SeaMonkey Messenger displayed\nmalformed inline vcard attachments. If a victim viewed an email message\ncontaining a carefully crafted vcard, it was possible to execute arbitrary\ncode as the user running SeaMonkey Messenger. (CVE-2006-3804)\n\nSeveral flaws were found in the way SeaMonkey processed certain javascript\nactions. A malicious web page could conduct a cross-site scripting attack\nor steal sensitive information (such as cookies owned by other domains).\n(CVE-2006-3802, CVE-2006-3810)\n\nA flaw was found in the way SeaMonkey processed Proxy AutoConfig scripts. A\nmalicious Proxy AutoConfig server could execute arbitrary javascript\ninstructions with the permissions of \"chrome\", allowing the page to steal\nsensitive information or install browser malware. (CVE-2006-3808)\n\nUsers of SeaMonkey are advised to upgrade to this update, which contains\nSeaMonkey version 1.0.3 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2006:0608",
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#critical",
"url": "http://www.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "200253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200253"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0608.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2026-01-13T22:34:27+00:00",
"generator": {
"date": "2026-01-13T22:34:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2006:0608",
"initial_release_date": "2006-07-27T19:53:00+00:00",
"revision_history": [
{
"date": "2006-07-27T19:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2006-07-27T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:34:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.src",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.src",
"product_id": "seamonkey-0:1.0.3-0.el3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.3-0.el3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"product": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"product_id": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.3-0.el3.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.src"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-3113",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618135"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3113"
},
{
"category": "external",
"summary": "RHBZ#1618135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3113"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3677",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618153"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3677"
},
{
"category": "external",
"summary": "RHBZ#1618153",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3677"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3801",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618161"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3801"
},
{
"category": "external",
"summary": "RHBZ#1618161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3802",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618162"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3802"
},
{
"category": "external",
"summary": "RHBZ#1618162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3802"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3803",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618163"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3803"
},
{
"category": "external",
"summary": "RHBZ#1618163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3803"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3804",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618164"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3804"
},
{
"category": "external",
"summary": "RHBZ#1618164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3804"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3805",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618165"
}
],
"notes": [
{
"category": "description",
"text": "The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3805"
},
{
"category": "external",
"summary": "RHBZ#1618165",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3805"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3806",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618166"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified \"string function arguments.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3806"
},
{
"category": "external",
"summary": "RHBZ#1618166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3806"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3807",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618167"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling \"named JavaScript functions\" that use the constructor.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3807"
},
{
"category": "external",
"summary": "RHBZ#1618167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3807"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3808",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618168"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3808"
},
{
"category": "external",
"summary": "RHBZ#1618168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3808"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3809",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618169"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3809"
},
{
"category": "external",
"summary": "RHBZ#1618169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3809"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3810",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618170"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3810"
},
{
"category": "external",
"summary": "RHBZ#1618170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3810"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3811",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618171"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) \"anonymous box selectors outside of UA stylesheets,\" (5) stale references to \"removed nodes,\" and (6) running the crypto.generateCRMFRequest callback on deleted context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3811"
},
{
"category": "external",
"summary": "RHBZ#1618171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3811"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2006-3812",
"discovery_date": "2006-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200455"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3812"
},
{
"category": "external",
"summary": "RHBZ#200455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3812"
}
],
"release_date": "2006-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2006-07-27T19:53:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"3AS:seamonkey-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-0:1.0.3-0.el3.1.src",
"3AS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3AS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.src",
"3Desktop:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-0:1.0.3-0.el3.1.src",
"3ES:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3ES:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-0:1.0.3-0.el3.1.src",
"3WS:seamonkey-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-chat-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-debuginfo-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-js-debugger-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-mail-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-0:1.0.3-0.el3.1.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.i386",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ia64",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.ppc",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.s390x",
"3WS:seamonkey-nss-devel-0:1.0.3-0.el3.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2006:0608"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "vulnerabilities: CVE-2006-{3113,3677,3801-3812}"
}
]
}
CERTA-2006-AVI-312
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été identifiées dans les produits Mozilla. Celles-ci permettraient à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
De multiples vulnérabilités présentes dans Mozilla Firefox, Thunderbird et SeaMonkey permettent à un utilisateur malveillant de provoquer un déni de service, de réaliser une attaque de type injection de code indirecte (aussi appelé cross-Site Scripting) ou d'exécuter du code arbitraire à distance. Plusieurs de ces vulnérabilités sont issues du module Javascript.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox version 1.5.0.4 ainsi que les versions ant\u00e9rieures ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird version 1.5.0.4 ainsi que les versions ant\u00e9rieures ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla SeaMonkey version 1.0.2 ainsi que les versions ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Mozilla Firefox, Thunderbird\net SeaMonkey permettent \u00e0 un utilisateur malveillant de provoquer un\nd\u00e9ni de service, de r\u00e9aliser une attaque de type injection de code\nindirecte (aussi appel\u00e9 cross-Site Scripting) ou d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance. Plusieurs de ces vuln\u00e9rabilit\u00e9s sont issues du\nmodule Javascript.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"name": "CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"name": "CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"name": "CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"name": "CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"name": "CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"name": "CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"name": "CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"name": "CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"name": "CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"name": "CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"name": "CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"name": "CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"name": "CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3808 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3808"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-51 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-51.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3809 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3809"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-45 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0610 du 28 juillet 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0610.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-55 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-55.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0609 du 02 ao\u00fbt 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-52 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-52.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200608-04 du 03 ao\u00fbt 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-04.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-53 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-53.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-56 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-56.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3802 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0611 du 28 juillet 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0611.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-327-1 du 27 juillet 2006 :",
"url": "http://www.ubuntu.com/usn/usn-327-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3803 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3803"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3805 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3805"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-47 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-47.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-44 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-54 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-54.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3113 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3113"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0608 du 27 juillet 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0608.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-49 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-49.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-50 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-50.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Mandriva Linux MDKSA-2006:143-1 du 17 ao\u00fbt 2006 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-329-1 du 28 juillet 2006 :",
"url": "http://www.ubuntu.com/usn/usn-329-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-48 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-48.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3677 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3677"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3804 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3804"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SGI 20060703-01-P du 31 juillet 2006 :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200608-03 du 03 ao\u00fbt 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-46 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-46.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3812 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3812"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3801 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3801"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3810 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3810"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3807 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3807"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3806 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3806"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200608-02 du 03 ao\u00fbt 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-02.xml"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3811 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3811"
}
],
"reference": "CERTA-2006-AVI-312",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2006-07-27T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Redhat, Ubuntu et SGI.",
"revision_date": "2006-08-02T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Redhat et Gentoo.",
"revision_date": "2006-08-04T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandriva Linux.",
"revision_date": "2006-08-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans les produits\nMozilla. Celles-ci permettraient \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter\ndu code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 25 juillet 2006",
"url": null
}
]
}
CERTA-2006-AVI-312
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été identifiées dans les produits Mozilla. Celles-ci permettraient à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
De multiples vulnérabilités présentes dans Mozilla Firefox, Thunderbird et SeaMonkey permettent à un utilisateur malveillant de provoquer un déni de service, de réaliser une attaque de type injection de code indirecte (aussi appelé cross-Site Scripting) ou d'exécuter du code arbitraire à distance. Plusieurs de ces vulnérabilités sont issues du module Javascript.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox version 1.5.0.4 ainsi que les versions ant\u00e9rieures ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird version 1.5.0.4 ainsi que les versions ant\u00e9rieures ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla SeaMonkey version 1.0.2 ainsi que les versions ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Mozilla Firefox, Thunderbird\net SeaMonkey permettent \u00e0 un utilisateur malveillant de provoquer un\nd\u00e9ni de service, de r\u00e9aliser une attaque de type injection de code\nindirecte (aussi appel\u00e9 cross-Site Scripting) ou d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance. Plusieurs de ces vuln\u00e9rabilit\u00e9s sont issues du\nmodule Javascript.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3801"
},
{
"name": "CVE-2006-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3804"
},
{
"name": "CVE-2006-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3806"
},
{
"name": "CVE-2006-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3677"
},
{
"name": "CVE-2006-3809",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3809"
},
{
"name": "CVE-2006-3811",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3811"
},
{
"name": "CVE-2006-3810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3810"
},
{
"name": "CVE-2006-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3808"
},
{
"name": "CVE-2006-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3802"
},
{
"name": "CVE-2006-3113",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3113"
},
{
"name": "CVE-2006-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3812"
},
{
"name": "CVE-2006-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3805"
},
{
"name": "CVE-2006-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3807"
},
{
"name": "CVE-2006-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3803"
}
],
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3808 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3808"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-51 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-51.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3809 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3809"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-45 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-45.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0610 du 28 juillet 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0610.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-55 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-55.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0609 du 02 ao\u00fbt 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-52 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-52.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200608-04 du 03 ao\u00fbt 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-04.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-53 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-53.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-56 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-56.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3802 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3802"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0611 du 28 juillet 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0611.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-327-1 du 27 juillet 2006 :",
"url": "http://www.ubuntu.com/usn/usn-327-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3803 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3803"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3805 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3805"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-47 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-47.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-44 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-54 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-54.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3113 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3113"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0608 du 27 juillet 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0608.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-49 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-49.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-50 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-50.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Mandriva Linux MDKSA-2006:143-1 du 17 ao\u00fbt 2006 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-329-1 du 28 juillet 2006 :",
"url": "http://www.ubuntu.com/usn/usn-329-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-48 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-48.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3677 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3677"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3804 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3804"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SGI 20060703-01-P du 31 juillet 2006 :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200608-03 du 03 ao\u00fbt 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA-2006-46 du 25 juillet 2006 :",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-46.html"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3812 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3812"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3801 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3801"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3810 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3810"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3807 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3807"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3806 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3806"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200608-02 du 03 ao\u00fbt 2006 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-02.xml"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2006-3811 :",
"url": "http://cve.mitre.org/cgi-bin/cvs-name.cgi?name=CVE-2006-3811"
}
],
"reference": "CERTA-2006-AVI-312",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2006-07-27T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Redhat, Ubuntu et SGI.",
"revision_date": "2006-08-02T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Redhat et Gentoo.",
"revision_date": "2006-08-04T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandriva Linux.",
"revision_date": "2006-08-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans les produits\nMozilla. Celles-ci permettraient \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter\ndu code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 25 juillet 2006",
"url": null
}
]
}
GSD-2006-3801
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2006-3801",
"description": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"id": "GSD-2006-3801",
"references": [
"https://www.suse.com/security/cve/CVE-2006-3801.html",
"https://access.redhat.com/errata/RHSA-2006:0611",
"https://access.redhat.com/errata/RHSA-2006:0610",
"https://access.redhat.com/errata/RHSA-2006:0609",
"https://access.redhat.com/errata/RHSA-2006:0608",
"https://access.redhat.com/errata/RHSA-2006:0594",
"https://linux.oracle.com/cve/CVE-2006-3801.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2006-3801"
],
"details": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"id": "GSD-2006-3801",
"modified": "2023-12-13T01:19:57.200763Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-3801",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc",
"refsource": "MISC",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2006-0609.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name": "http://secunia.com/advisories/19873",
"refsource": "MISC",
"url": "http://secunia.com/advisories/19873"
},
{
"name": "http://secunia.com/advisories/21216",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21216"
},
{
"name": "http://secunia.com/advisories/21228",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21228"
},
{
"name": "http://secunia.com/advisories/21229",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21229"
},
{
"name": "http://secunia.com/advisories/21243",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21243"
},
{
"name": "http://secunia.com/advisories/21246",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21246"
},
{
"name": "http://secunia.com/advisories/21250",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21250"
},
{
"name": "http://secunia.com/advisories/21262",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21262"
},
{
"name": "http://secunia.com/advisories/21269",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21269"
},
{
"name": "http://secunia.com/advisories/21270",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21270"
},
{
"name": "http://secunia.com/advisories/21336",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21336"
},
{
"name": "http://secunia.com/advisories/21343",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21343"
},
{
"name": "http://secunia.com/advisories/21358",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21358"
},
{
"name": "http://secunia.com/advisories/21361",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21361"
},
{
"name": "http://secunia.com/advisories/21529",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21529"
},
{
"name": "http://secunia.com/advisories/21532",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21532"
},
{
"name": "http://secunia.com/advisories/21631",
"refsource": "MISC",
"url": "http://secunia.com/advisories/21631"
},
{
"name": "http://secunia.com/advisories/22065",
"refsource": "MISC",
"url": "http://secunia.com/advisories/22065"
},
{
"name": "http://secunia.com/advisories/22066",
"refsource": "MISC",
"url": "http://secunia.com/advisories/22066"
},
{
"name": "http://secunia.com/advisories/22210",
"refsource": "MISC",
"url": "http://secunia.com/advisories/22210"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200608-02.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"name": "http://securitytracker.com/id?1016586",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1016586"
},
{
"name": "http://securitytracker.com/id?1016587",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1016587"
},
{
"name": "http://securitytracker.com/id?1016588",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1016588"
},
{
"name": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml",
"refsource": "MISC",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"name": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html",
"refsource": "MISC",
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2006-0594.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2006-0608.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2006-0610.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2006-0611.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name": "http://www.securityfocus.com/archive/1/441333/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/446657/100/200/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/446658/100/200/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "http://www.securityfocus.com/bid/19181",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/19181"
},
{
"name": "http://www.ubuntu.com/usn/usn-354-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"name": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html",
"refsource": "MISC",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"name": "http://www.vupen.com/english/advisories/2006/2998",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"name": "http://www.vupen.com/english/advisories/2006/3748",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name": "http://www.vupen.com/english/advisories/2006/3749",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "http://www.vupen.com/english/advisories/2008/0083",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "https://issues.rpath.com/browse/RPL-536",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"name": "https://issues.rpath.com/browse/RPL-537",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"name": "https://usn.ubuntu.com/327-1/",
"refsource": "MISC",
"url": "https://usn.ubuntu.com/327-1/"
},
{
"name": "http://www.kb.cert.org/vuls/id/476724",
"refsource": "MISC",
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html",
"refsource": "MISC",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-3801"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#476724",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"name": "https://issues.rpath.com/browse/RPL-536",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"name": "19181",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/19181"
},
{
"name": "1016586",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1016586"
},
{
"name": "1016587",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1016587"
},
{
"name": "1016588",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1016588"
},
{
"name": "19873",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19873"
},
{
"name": "21216",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21216"
},
{
"name": "21228",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21228"
},
{
"name": "21229",
"refsource": "SECUNIA",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21229"
},
{
"name": "RHSA-2006:0608",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"name": "TA06-208A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"name": "21246",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21246"
},
{
"name": "RHSA-2006:0610",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"name": "RHSA-2006:0611",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"name": "21243",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21243"
},
{
"name": "21269",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21269"
},
{
"name": "21270",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21270"
},
{
"name": "GLSA-200608-02",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"name": "RHSA-2006:0609",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"name": "21336",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21336"
},
{
"name": "21358",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21358"
},
{
"name": "21361",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21361"
},
{
"name": "GLSA-200608-03",
"refsource": "GENTOO",
"tags": [],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"name": "https://issues.rpath.com/browse/RPL-537",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"name": "20060703-01-P",
"refsource": "SGI",
"tags": [],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
},
{
"name": "21250",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21250"
},
{
"name": "21262",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21262"
},
{
"name": "21343",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21343"
},
{
"name": "SUSE-SA:2006:048",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"name": "21529",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21529"
},
{
"name": "21532",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21532"
},
{
"name": "RHSA-2006:0594",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"name": "21631",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/21631"
},
{
"name": "USN-354-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"name": "22210",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/22210"
},
{
"name": "MDKSA-2006:143",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"name": "MDKSA-2006:145",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"name": "22065",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/22065"
},
{
"name": "22066",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/22066"
},
{
"name": "ADV-2006-3749",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"name": "ADV-2006-3748",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"name": "ADV-2008-0083",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"name": "ADV-2006-2998",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"name": "mozilla-deleted-frame-code-execution(27980)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"name": "oval:org.mitre.oval:def:11501",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
},
{
"name": "USN-327-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/327-1/"
},
{
"name": "SSRT061181",
"refsource": "HP",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"name": "SSRT061236",
"refsource": "HP",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name": "20060727 rPSA-2006-0137-1 firefox",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-17T21:30Z",
"publishedDate": "2006-07-27T20:04Z"
}
}
}
GHSA-888J-W88X-VJQR
Vulnerability from github – Published: 2022-05-03 03:16 – Updated: 2022-05-03 03:16Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
{
"affected": [],
"aliases": [
"CVE-2006-3801"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2006-07-27T20:04:00Z",
"severity": "HIGH"
},
"details": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.",
"id": "GHSA-888j-w88x-vjqr",
"modified": "2022-05-03T03:16:12Z",
"published": "2022-05-03T03:16:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3801"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/327-1"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/19873"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21216"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21228"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21229"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21243"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21246"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21250"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21262"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21269"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21270"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21336"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21343"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21358"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21361"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21529"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21532"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/21631"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/22065"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/22066"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/22210"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1016586"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1016587"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1016588"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/19181"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0083"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2006-3801
Vulnerability from fkie_nvd - Published: 2006-07-27 20:04 - Updated: 2025-04-03 01:03| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2006-0609.html | ||
| secalert@redhat.com | http://secunia.com/advisories/19873 | Patch, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/21216 | Patch, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/21228 | Patch, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/21229 | Patch, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/21243 | ||
| secalert@redhat.com | http://secunia.com/advisories/21246 | ||
| secalert@redhat.com | http://secunia.com/advisories/21250 | ||
| secalert@redhat.com | http://secunia.com/advisories/21262 | ||
| secalert@redhat.com | http://secunia.com/advisories/21269 | ||
| secalert@redhat.com | http://secunia.com/advisories/21270 | ||
| secalert@redhat.com | http://secunia.com/advisories/21336 | ||
| secalert@redhat.com | http://secunia.com/advisories/21343 | ||
| secalert@redhat.com | http://secunia.com/advisories/21358 | ||
| secalert@redhat.com | http://secunia.com/advisories/21361 | ||
| secalert@redhat.com | http://secunia.com/advisories/21529 | ||
| secalert@redhat.com | http://secunia.com/advisories/21532 | ||
| secalert@redhat.com | http://secunia.com/advisories/21631 | ||
| secalert@redhat.com | http://secunia.com/advisories/22065 | ||
| secalert@redhat.com | http://secunia.com/advisories/22066 | ||
| secalert@redhat.com | http://secunia.com/advisories/22210 | ||
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200608-02.xml | ||
| secalert@redhat.com | http://securitytracker.com/id?1016586 | ||
| secalert@redhat.com | http://securitytracker.com/id?1016587 | ||
| secalert@redhat.com | http://securitytracker.com/id?1016588 | ||
| secalert@redhat.com | http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml | ||
| secalert@redhat.com | http://www.kb.cert.org/vuls/id/476724 | Third Party Advisory, US Government Resource | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 | ||
| secalert@redhat.com | http://www.mozilla.org/security/announce/2006/mfsa2006-44.html | ||
| secalert@redhat.com | http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2006-0594.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2006-0608.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2006-0610.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2006-0611.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/441333/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/446657/100/200/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/446658/100/200/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/19181 | Patch | |
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-354-1 | ||
| secalert@redhat.com | http://www.us-cert.gov/cas/techalerts/TA06-208A.html | US Government Resource | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2006/2998 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2006/3748 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2006/3749 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2008/0083 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/27980 | ||
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-536 | ||
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-537 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501 | ||
| secalert@redhat.com | https://usn.ubuntu.com/327-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2006-0609.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/19873 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21216 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21228 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21229 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21243 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21246 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21250 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21262 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21269 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21270 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21336 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21343 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21358 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21361 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21529 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21532 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21631 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22065 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22066 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22210 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200608-02.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016586 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016587 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1016588 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/476724 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2006/mfsa2006-44.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2006-0594.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2006-0608.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2006-0610.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2006-0611.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/441333/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/446657/100/200/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/446658/100/200/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19181 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-354-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA06-208A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/2998 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3748 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/3749 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0083 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/27980 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-536 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-537 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/327-1/ |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F38886-C25A-4C6B-93E7-36461405BA99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E18FC0-0C8C-4FA1-85B9-B868D00F002F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"matchCriteriaId": "55344F76-1C42-4DD8-A28B-1C33626C6FD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6521C877-63C9-4B6E-9FC9-1263FFBB7950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D949DF0A-CBC2-40E1-AE6C-60E6F58D2481",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code."
},
{
"lang": "es",
"value": "Mozilla Firefox 1.5 anterior a 1.5.0.5 y SeaMonkey anterior a 1.0.3 no limpia de forma adecuada una referencia JavaScript a un frame o window, lo caul deja un punterio a un objeto borrado que permite a atacantes remotos ejecutar c\u00f3digo nativo de su elecci\u00f3n."
}
],
"id": "CVE-2006-3801",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-07-27T20:04:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19873"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21216"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21228"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21229"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21243"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21246"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21250"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21262"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21269"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21270"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21336"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21343"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21358"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21361"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21529"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21532"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/21631"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/22065"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/22066"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/22210"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1016586"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1016587"
},
{
"source": "secalert@redhat.com",
"url": "http://securitytracker.com/id?1016588"
},
{
"source": "secalert@redhat.com",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/19181"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"source": "secalert@redhat.com",
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
},
{
"source": "secalert@redhat.com",
"url": "https://usn.ubuntu.com/327-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/19873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21228"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/21229"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21246"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21262"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21269"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21270"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21336"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21532"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21631"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22210"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200608-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/476724"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-44.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0608.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/441333/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/19181"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-354-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/2998"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3749"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27980"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-536"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-537"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11501"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/327-1/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.